General

  • Target

    bb6abd1be876d7e2dcde8b94c75933d7d2c837145be88c57d5f5eb33759fc700.bin

  • Size

    205KB

  • Sample

    240809-157r5ssanp

  • MD5

    f0a8957391dfe78e81d89cbcf0f7675c

  • SHA1

    22011f28efba9f02a553d7aa7e880c43a58b7e05

  • SHA256

    bb6abd1be876d7e2dcde8b94c75933d7d2c837145be88c57d5f5eb33759fc700

  • SHA512

    0bfe63f7715a851f68bd5710f0eeaa9016bfe03e6db990c14e47421423fdab32ba1c048a01734203645e2541ab36ee9ec4f7d7a2c8851fc210e04fa800199261

  • SSDEEP

    6144:ZcbhUWUqaAawLP7wlFgdneJXIqxBANlYWCT:ZJrfxwT7egBeJXIKY+WCT

Malware Config

Targets

    • Target

      bb6abd1be876d7e2dcde8b94c75933d7d2c837145be88c57d5f5eb33759fc700.bin

    • Size

      205KB

    • MD5

      f0a8957391dfe78e81d89cbcf0f7675c

    • SHA1

      22011f28efba9f02a553d7aa7e880c43a58b7e05

    • SHA256

      bb6abd1be876d7e2dcde8b94c75933d7d2c837145be88c57d5f5eb33759fc700

    • SHA512

      0bfe63f7715a851f68bd5710f0eeaa9016bfe03e6db990c14e47421423fdab32ba1c048a01734203645e2541ab36ee9ec4f7d7a2c8851fc210e04fa800199261

    • SSDEEP

      6144:ZcbhUWUqaAawLP7wlFgdneJXIqxBANlYWCT:ZJrfxwT7egBeJXIKY+WCT

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks